How to Perform Verification and Validation of Critical Infrastructure Modeling Tools

Author(s):  
Alfonso Farina ◽  
Antonio Graziano ◽  
Stefano Panzieri ◽  
Federica Pascucci ◽  
Roberto Setola
2009 ◽  
pp. 107-120 ◽  
Author(s):  
I. Bashmakov

On the eve of the worldwide negotiations of a new climate agreement in December 2009 in Copenhagen it is important to clearly understand what Russia can do to mitigate energy-related greenhouse gas emissions in the medium (until 2020) and in the long term (until 2050). The paper investigates this issue using modeling tools and scenario approach. It concludes that transition to the "Low-Carbon Russia" scenarios must be accomplished in 2020—2030 or sooner, not only to mitigate emissions, but to block potential energy shortages and its costliness which can hinder economic growth.


2020 ◽  
Vol 2 (1) ◽  
pp. 35-42
Author(s):  
Hemalatha R ◽  
Rhesa M.J. ◽  
Revathi S

The hest for technological advancement in mobile communication is due to augmentation of wireless user. The deployment of 5G mobile communication is less than 4G mobile communication due to challenges in security like cyberwarfare, espionage, critical infrastructure threats. Nevertheless, critic of neurological discomforts, tissue damage in living organisms occur in the existence of EMF radiation. Also, physical scarcity for spectral efficiency arises due to ubiquitous data traffic. Inspite of these disputes data rate, low latency, device to device communication is also a challenge. In this paper we provide a survey on radiation effects, security threats, traffic management.


Sign in / Sign up

Export Citation Format

Share Document